Today's cyber attackers are more specialized, targeted and innovative when it comes to seeking new attack vectors and circumventing perimeter defenses and old-school honeypot traps.

It's time for a changing of the guard. Cyber security experts should take a page out of the attackers' playbook and use a more realistic set of illusions to trap, track and thwart their actions from the start.